How strong is your weed, really? Scientists say labels often mislead-Click HereMIT scientists discover hidden 3D genome loops that survive cell division-Click HereYou might look healthy, but hidden fat could be silently damaging your heart-Click HereScientists reversed brain aging and memory loss in mice-Click HereDoctors just found a way to slow one of the deadliest prostate cancers-Click HereRunning fixes what junk food breaks in the brain-Click HereBird flu hiding in cheese? The surprising new discovery-Click HereHow just minutes of running can supercharge your health-Click HereScientists reveal the best exercise to ease knee arthritis pain-Click HereAre cancer surgeries removing the body’s secret weapon against cancer?-Click HereSports concussions increase injury risk-Click HereUncovering a cellular process that leads to inflammation-Click HereNew study links contraceptive pills and depression-Click HereA short snout predisposes dogs to sleep apnea-Click HereBuilding a new vaccine arsenal to eradicate polio-Click HereThe Viking disease can be due to gene variants inherited from Neanderthals-Click HereQatar Omicron-wave study shows slow decline of natural immunity, rapid decline of vaccine immunity-Click HereMore than a quarter of people with asthma still over-using rescue inhalers, putting them at increased risk of severe attacks-Click hereProgress on early detection of Alzheimer’s disease-Click HereDried samples of saliva and fingertip blood are useful in monitoring responses to coronavirus vaccines-Click HereDietary fiber in the gut may help with skin allergies-Click HereResearchers discover mechanism linking mutations in the ‘dark matter’ of the genome to cancer-Click HereDespite dire warnings, monarch butterfly numbers are solid-Click HereImmunotherapy may get a boost-Click HereArtificial intelligence reveals a never-before described 3D structure in rotavirus spike protein-Click HereRecurring brain tumors shaped by genetic evolution and microenvironment-Click HereCompound shows promise for minimizing erratic movements in Parkinson’s patients-Click HereConsuming fruit and vegetables and exercising can make you happier-Click HereCOVID-19 slows birth rate in US, Europe-Click HereLink between ADHD and dementia across generations-Click HerePreventing the long-term effects of traumatic brain injury-Click HereStudy details robust T-cell response to mRNA COVID-19 vaccines — a more durable source of protection-Click HereArtificial color-changing material that mimics chameleon skin can detect seafood freshness-Click HereNeural implant monitors multiple brain areas at once, provides new neuroscience insights-Click HereB cell activating factor possible key to hemophilia immune tolerance-Click HereMasks not enough to stop COVID-19’s spread without distancing, study finds-Click HereAI can detect COVID-19 in the lungs like a virtual physician, new study shows-Click HerePhase 1 human trials suggest breast cancer drug is safe, effective-Click HereRe-engineered enzyme could help reverse damage from spinal cord injury and stroke-Click HereWeight between young adulthood and midlife linked to early mortality-Click HereIncreased fertility for women with Neanderthal gene, study suggests-Click HereCoronavirus testing kits to be developed using RNA imaging technology-Click HereFacial expressions don’t tell the whole story of emotion-Click HereAcid reflux drug is a surprising candidate to curb preterm birth-Click HereTreating Gulf War Illness With FDA-Approved Antiviral Drugs-Click HereHeart patch could limit muscle damage in heart attack aftermath-Click HereA nap a day keeps high blood pressure at bay-Click HereIn small groups, people follow high-performing leaders-Click HereTick tock: Commitment readiness predicts relationship success-Click HereA comprehensive ‘parts list’ of the brain built from its components, the cells-Click HereResearchers confine mature cells to turn them into stem cells-Click HereNew tissue-imaging technology could enable real-time diagnostics, map cancer progression-Click HereEverything big data claims to know about you could be wrong-Click HerePsychedelic drugs promote neural plasticity in rats and flies-Click HereEducation linked to higher risk of short-sightedness-Click HereNew 3D printer can create complex biological tissues-Click HereThe creative brain is wired differently-Click HereWomen survive crises better than men-Click HerePrecise DNA editing made easy: New enzyme to rewrite the genome-Click HereFirst Time-Lapse Footage of Cell Activity During Limb RegenerationStudy Suggests Approach to Waking Patients After Surgery

Human Hacking: When Cyber Criminals Target You

0

Orlando, Fla. (Ivanhoe Newswire) — When you get anti-hacking advice, you’ve probably heard “Don’t use a simple password,” or “Don’t plug in that USB you found on the ground.” But there’s one form of hacking that doesn’t always require a computer, and it costs businesses about 4.88 million dollars a year.

Modern hackers aren’t trying to get into your computer, they’re trying to get into you, human hacking.

“They’ll try to learn about you a little bit, and they’ll try to use that information against you to try to get you to complete some action, maybe to send somebody some money,” said Kevin Moran, PhD, Assistant Professor of Computer Science, Cyber Security and Privacy Cluster, University of Central Florida.

IBM calls this human hacking, because it exploits human error instead of system error.

“With people just being busy and maybe not very carefully checking some of the emails or the phone calls that they get, can be something unfortunately that people can fall victim to,” said Moran.

Also known as social engineering, this often takes the form of phishing, where the hacker tries to “fish” the information out of you by impersonating family, friends, or even your bank. There’s also baiting, where the hacker baits you with something of value. Remember the Nigerian prince scam?

That’s a famous example of baiting. There’s also pretexting, where the hacker will claim the victim has already been hacked, and that the hacker can fix it if you just send over your passwords. So, what can you do?

“Just as a rule of thumb, instead of clicking on links and emails, just go to the website yourself. And that will prevent, a lot of these types of attacks from happening,” explained Moran.

Phishing can take many forms. Spear phishing targets people with access to confidential information, often to get access into an entire business, and whale phishing targets CEOs or political figures. Search engine phishing is when hackers create fake websites promising services or goods you’ll never receive. Angler phishing is when hackers create fake social media accounts impersonating famous people or companies. Finally, vishing and smishing is phishing done through phone calls and texts respectively.

Contributors to this news report include: Marcy Wilder, Producer; Bob Walko, Editor.

To receive a free weekly email on Smart Living from Ivanhoe, sign up at:  http://www.ivanhoe.com/ftk 

Sources:

https://www.ibm.com/reports/data-breach

https://www.ibm.com/topics/social-engineering